default search action
1st SESS@ICSE 2005: St. Louis, Missouri, USA
- Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005. ACM 2005, ISBN 1-59593-114-7
- Jie Ren, Richard N. Taylor, Paul Dourish, David F. Redmiles:
Towards an architectural treatment of software security: a connector-centric approach. 1-7 - Nancy R. Mead, Ted Stehney:
Security quality requirements engineering (SQUARE) methodology. 1-7 - Wes Masri, Andy Podgurski:
Using dynamic information flow analysis to detect attacks against applications. 1-7 - Ömer Erdem Demir, Premkumar T. Devanbu, Nenad Medvidovic, Eric Wohlstadter:
DISCOA: architectural adaptations for security and QoS. 1-7 - John Viega:
Building security requirements with CLASP. 1-7 - Somo Banerjee, Chris A. Mattmann, Nenad Medvidovic, Leana Golubchik:
Leveraging architectural models to inject trust into software systems. 1-7 - Maarten Rits, Benjamin De Boe, Andreas Schaad:
XacT: a bridge between resource management and access control in multi-layered applications. 1-7 - Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen:
Towards a unifying view on security contracts. 1-7 - Zaid Dwaikat, Francesco Parisi-Presicce:
Risky trust: risk-based analysis of software systems. 1-7 - Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel:
Enabling control over adaptive program transformation for dynamically evolving mobile software validation. 1-7 - Karsten Sohr, Gail-Joon Ahn, Lars Migge:
Articulating and enforcing authorisation policies with UML and OCL. 1-7 - Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn:
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. 1-7 - Ben Breech, Lori L. Pollock:
A framework for testing security mechanisms for program-based attacks. 1-7 - Sam Weber, Paul A. Karger, Amit M. Paradkar:
A software flaw taxonomy: aiming tools at security. 1-7 - Michael Gegick, Laurie A. Williams:
Matching attack patterns to security vulnerabilities in software-intensive system designs. 1-7 - Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Requirements traceability to support evolution of access control. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.